Robust Security Infrastructure - Short Duration Course - Combined 1
Robust Security Infrastructure - Short Duration Course - Combined 1
Security
Infrastructure
1
WRAP 12 Principles
Table of Contents
1. Session I: Introduction to Security
Infrastructure
• General Security Concerns
• Introduction of CTPAT Model
• Addressing Security Challenges
4. WRAP Overview
5
CBP Web Resouces
• MSC for Foreign Manufacturers
• https://www.cbp.gov/border-security/ports-entry/cargo-
security/ctpat/security-guidelines/foreign-manufacturers
• MRA
• https://www.cbp.gov/border-security/ports-entry/cargo-security/c-tpat-
customs-trade-partnership-against-terrorism/mutual-recognition
• Resource Library
• https://www.cbp.gov/border-security/ports-entry/cargo-
security/c-tpat-customs-trade-partnership-against-
terrorism/c-tpat-resource-library-and-job-aids
6
CTPAT as a model
7
CTPAT as a model to create Security
Infrastructure
• CTPAT is a common and effective systemic requirement
introduced by US Customs which is designed as a
deterrent, acting against terrorism related activities.
• We use this model to demonstrate implementing a
Robust Infrastructure with the objective of providing safe
and healthy work environment.
• Companies have to protect people and products
• Ensure confidentiality of information, financial records,
trade secrets and much more.
8
Overview of Customs Trade Partnership
Against Terrorism
The people and physical security focus area encompass
well known criteria for securing facilities and training
personnel. The education of employees is a key
component of the criteria, and as such, training of
personnel on the importance of security is now a Program
requirement.
• Minimum Security Criteria (MSC)
• We will explain:
- Policies and Procedures
- Risk Assessment and Documentation
- Internal Monitoring
- Major Changes in this version
9
Focus Areas and Criteria Categories
Focus Area ID Criteria Categories
1 Security Vision and Responsibility (New in 2019) 3 Focus
2 Risk Assessment Areas
Corporate Security
3 Business Partner Security 12 Security
4 Cybersecurity (New in 2019) Criteria
Categories
5 Conveyance and Instruments of International
Traffic Security
Transportation Security 6 Seal Security Each Criteria
7 Procedural Security has an ID
Number
8 Agricultural Security (New in 2019)
9 Physical Access Controls
People and Physical 10 Physical Security
Security 11 Personnel Security
12 Education, Training, and Awareness
10
How to address security challenges
• Adopt a standard international practice that is globally
accepted.
• Understanding the requirements
• Involving people
• Developing objective based systems
• Regular monitoring
• Initiating improvement action plans
• Review of systems
11
Session II:
New and Focused Requirements
12
Focus Area: Corporate Security
Criteria Category: Security Vision &
Responsibility
• Involvement of Top Management
• Statement of Support
13
1.1: Statement of Support
• CTPAT Members should demonstrate their commitment
to supply chain security and the CTPAT Program
through a statement of support, which should be signed
by a senior company official and displayed in
appropriate company locations.
18
Focus Area: Corporate Security
Criteria Category: CTPAT Risk Assessment
19
Risk Assessment
• Full Risk Assessment including
threats and vulnerabilities from
both, within and outside of the
organization.
• Focus on its implementation and
effectiveness.
• Mapping of all security criteria to
the risk assessment.
• Periodic review of the risk
assessment.
• Preparing Security contingency plan
20
CTPAT Five-Step Risk Assessment
Step 1. Mapping Goods and Cargo and Identifying Business Partners
Step 4. Action Plan: Developed Once Threats and Weaknesses have been
Identified
26
Focus Area: Corporate Security
4. Cybersecurity (NEW)
• Implementation Guidance:
– Authentication: 2FA or MFA Preferred
– Prefer use of long easy-to-remember passphrases instead of passwords.
– Require screening of new PWDS (commonly used/compromised PWDS).
4.11 Use of Licensed Software
• Policy should include measures to prevent use of unlicensed
software.
39
Focus Area: Transportation Security
Criteria Category: Conveyance and IIT
Security
40
What are IIT?
Instruments of International Traffic – Containers, flatbeds, unit load devices
(ULDs), lift vans, cargo vans, shipping tanks, bins, skids, pallets, caul boards,
cores for textile fabrics, or other specialized containers arriving (loaded or empty)
in use or to be used in the shipment of merchandise in international trade.
41
Focus Area: Transportation Security
5. Conveyance and Instruments of International
Traffic Security (IIT)
• The hinges of the door should be sealed. Even for smaller facilities,
a procedure should be established for transporting the goods from
the facility to the main container loading station.
V View
V Verify
T Tug
T Twist
“The sealing of trailers and containers, to include continuous seal integrity, continues to be
a crucial element of the secure supply chain. Seal security includes having a
comprehensive written seal policy that addresses all aspects of seal security; using the
correct seals per CTPAT requirements; properly placing a seal on an IIT and verifying that
the seal has been affixed properly.”
6.1 Seal Security
Written Policy and Procedure
• Facility must have documented policies and procedures that describe how
seals are issued and controlled at the facility and if possible, during transit.
• Seal Discrepancies:
– Hold any seal discovered to be altered or tampered with the aid in the investigation.
– Investigate the discrepancy; follow-up with corrective measures (if warranted).
– As applicable, report compromised seals to CBP and the appropriate foreign government to aid
in the investigation.
6.2 Immediate Sealing of Shipments
V View
V Verify
T Tug
T Twist
V – View seal and container locking mechanisms; ensure they are OK;
V – Verify seal number against shipment documents for accuracy;
T – Tug on seal to make sure it is affixed properly;
T – Twist and turn the bolt seal to make sure its components do not unscrew,
separate from one another, or any part of the seal becomes loose.
Conveyance and IIT Security
• Access controlled parking area of
Conveyances and IITs.
• Written procedures to carry out security
and agriculture inspection – before
loading, during and after loading.
• Loading must be under CCTV controlled
area.
• Random inspection of conveyance in
transit.
63
What is Pest Contamination?
Visible forms of animals, insects or other invertebrates (alive or
dead, in any lifecycle stage, including egg casings or rafts), or any
organic material of animal origin (including blood, bones, hair,
flesh, secretions, excretions); viable or non-viable plants or plant
products (including fruit, seeds, leaves, twigs, roots, bark); or other
organic material, including fungi; or soil, or water; where such
products are not the manifested cargo within instruments of
international traffic (i.e. containers, unit load devices, etc.).
64
Agricultural Security
• Washing or Vacuum Cleaning of conveyance in
case of any PEST contamination noted during
inspection.
• Written procedures designed to prevent visible
pest contamination to include compliance with
Wood Packaging Materials (WPM) regulations.
• WPM is defined as wood or wood products
(excluding paper products) used in supporting,
protecting, or carrying a commodity
65
Session III:
Effective Management System
66
What to do?
Develop a system framework -
System Documents Implementation Guide
Policies Procedures to implement policies
• Trainings on
– Risk Assessment - Incident Investigation
– Cyber Security - Conveyance Inspection
– Seals Inspection - Agriculture Security Inspection
– Internal Monitoring - Business Partner Security
– Emergency Situations
– CCTV recording random inspection
• Effectiveness of Trainings
69
Internal Management Systems
• Having a robust internal management system and
monitoring will help:
– Ensure that processes and procedures are
established.
– Test and verify that these processes and
procedures are effective.
• Risk Assessment
– Critical to have a solid RA process in place
integrated in your supply chain security program.
– Identify vulnerabilities and threats
– Mitigate current threat as needed
70
Internal Management Systems
1. Regular Trainings for New and
Existing Staff
71
Certification Levels
78
Thank You!
Neni Triani
Indonesia Representative
[email protected] / +62 813 1444 1619